• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2026 ■ Paul Warner
  • Home
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
        • Welcome Introduction-WrapUp
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 1c – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2a – Cryptography
      • Unit 2b – Secure Networks
      • Unit 2c – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 3b – Case Study 2 Maersk Attack
      • Unit 3c – Access Control
      • Unit 4a – Host Hardening
      • Unit 4b Application Security
      • Unit 4c Data Protection
      • Unit 5a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – “Cyberattack: The Maersk Global Supply-Chain Meltdown”
    • Team Project Instructions
  • Harvard Coursepack
  • NIST Publications
  • FedRAMP

Question 3

January 1, 2022 by Paul Warner Leave a Comment

What should Margrete Raaum do now? Would you suggest that Titan is ready to be turned on for local access? Is it ready to be reconnected to the computational grid?

 

 

Filed Under: 1c - Case Study 1 Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (2)
  • 0b – The Threat Environment (6)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 1c – Case Study 1 (4)
  • 2a – Cryptography (4)
  • 2b – Secure Networks (5)
  • 2c – Firewalls, Intrusion Detection and Protection Systems (3)
  • 3b – Case Study 2 (4)
  • 3c – Access Control (5)
  • 4a – Host Hardening (3)
  • 4b – Application Security (4)
  • 4c – Data Protection (2)
  • 5a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in